CEH v11: Metadata, Wordlists, Email, WHOIS & DNS Recon
Ethical Hacker v11
| Intermediate
- 4 Videos | 54m 26s
- Includes Assessment
- Earns a Badge
When you're looking for useful target information, you want to pull from every available source. In this course, you'll investigate how to gather and inspect metadata for possible sensitive info about a target. You'll learn how to use wordlists for fuzzing and password attacks, about the usefulness of custom wordlists, and how to generate a wordlist based off the target's web presence. Next, you'll examine how e-mail tracking systems can glean info like IP addresses, geolocation, and host operating systems. Finally, you'll learn about useful information that can be found using WHOIS and DNS service. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
-
recognize tools used to extract metadatarecognize tools used to locate files on a websiteidentify the location of sample word list files in Kali Linuxidentify the term used for files that contain common words and passwordsrecognize tools that can be used to create custom word list files
-
recognize tools used for email trackingidentify the different types of whois modelsidentify tools used to perform whois searchesrecognize commands used to enumerate DNS
IN THIS COURSE
-
1.Metadata Recon13m 56s
-
2.Custom Wordlists16m 24s
-
3.E-mail Tracking Systems8m 33s
-
4.WHOIS and DNS Recon15m 35s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.